General

  • Target

    2792-118-0x0000000000400000-0x0000000000643000-memory.dmp

  • Size

    2.3MB

  • MD5

    ff7f031607b0878d2ca90fe405bed912

  • SHA1

    2d84b7efa444be23108b39fdfcff44e6f1d20004

  • SHA256

    8750be58787e6a700acc82438200aacbae89d50af5249126af1a5fa4cae7c052

  • SHA512

    a0a0b2fe65f31ee4bbe05da25c918525140cb29eb466a400289ca5688bb77fcda6ea1e697d1488aea41db644229ebe78c0d77921a900ee2d23fd93e40f2dfbd7

  • SSDEEP

    6144:TsHPY7hsyvEBr3cQEKmnMGbv6j6zISI7xU2S:TszysqFnMx6zmS

Malware Config

Extracted

Family

vidar

Version

7.6

Botnet

1b9d7ec5a25ab9d78c31777a0016a097

C2

https://t.me/tvrugrats

https://steamcommunity.com/profiles/76561199627279110

Attributes
  • profile_id_v2

    1b9d7ec5a25ab9d78c31777a0016a097

Signatures

  • Detect Vidar Stealer 1 IoCs
  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2792-118-0x0000000000400000-0x0000000000643000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections